Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D103753191041D3B061382C4A2A5BB16E3C6864ACB978E51AFF8839B7FCBD71DD13B95 |
|
CONTENT
ssdeep
|
768:jDTmaLzuYcYvNsNgAs6s6s6s6s6s6s6s6s6s6s6s6tyuegNuhgeuegeAs6AOawAB:jDTmaLzxNsNXXXXXXXXXXXXX3PU65Px6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b99852b39253d726 |
|
VISUAL
aHash
|
ffffbb9fefef0000 |
|
VISUAL
dHash
|
a93373528b5ad808 |
|
VISUAL
wHash
|
ffc9bb9fd3c80000 |
|
VISUAL
colorHash
|
110010001c0 |
|
VISUAL
cropResistant
|
c8d82c362f202020,fcf0c0583c34b1d3,8b9b8e8999396b79,54e58192c6f1b2b2,86c2cecaeae4e4f0,35b52c6ec86a7838,cb89a1d23536b1b0,d8c8c8d8c8363e2e,1333721b0b58d918 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 43 techniques to evade detection by security scanners and make reverse engineering more difficult.